Link an upstream bug report for the thread-safeness in regexec()

This commit is contained in:
Petr Písař 2019-10-30 08:48:08 +01:00
parent 7302af99cc
commit 96360c9835

View File

@ -100,9 +100,11 @@ Patch16: pcre2-10.33-Add-underflow-check-in-JIT.patch
# Fix a use after free when freeing JIT memory, upstream bug #2453,
# in upstream after 10.33
Patch17: pcre2-10.33-Fix-use-after-free-and-compilation-error-in-JIT.patch
# 1/2 Fix thread-safeness in regexec(), in upstream after 10.33
# 1/2 Fix thread-safeness in regexec(), upstream bug #2447,
# in upstream after 10.33
Patch18: pcre2-10.33-Ensure-regexec-is-thread-safe-to-avoid-sanitizer-war.patch
# 2/2 Fix thread-safeness in regexec(), in upstream after 10.33
# 2/2 Fix thread-safeness in regexec(), upstream bug #2447,
# in upstream after 10.33
Patch19: pcre2-10.33-Fix-error-offset-bug-introduced-at-1176.patch
BuildRequires: autoconf
BuildRequires: automake
@ -301,7 +303,7 @@ make %{?_smp_mflags} check VERBOSE=yes
%changelog
* Tue Oct 29 2019 Petr Pisar <ppisar@redhat.com> - 10.33-15
- Fix a use after free when freeing JIT memory (upstream bug #2453)
- Fix thread-safeness in regexec()
- Fix thread-safeness in regexec() (upstream bug #2447)
* Mon Sep 09 2019 Petr Pisar <ppisar@redhat.com> - 10.33-14
- Fix a crash in JIT match when a subject has a zero length and an invalid